exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

AIDE 0.17
Posted Jan 25, 2021
Authored by Rami Lehti | Site aide.github.io

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

Changes: Updated man pages. Removed outdated aide.conf.in. Limited number of nested includes. Updates to documentation and various bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 4fd88d1d5ddc70c698c6519ebbc05c8d32c3f6d8137bbfdefeaebaafd6db867b

Related Files

afick-2.9-0.tgz
Posted Sep 7, 2006
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Some bug fixes and additions.
tags | tool, integrity
systems | windows, unix
SHA-256 | ab50e8a50f97954eed952f5c93f851f9a88391e760a3e05cc987a1cfe56c3de0
integrit-4.0.tar.gz
Posted Aug 17, 2006
Site integrit.sourceforge.net

Integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. integrit's major advantages are a small memory footprint and simplicity. It works by creating a database that is a snapshot of the most essential parts of your computer system. You put the database somewhere safe, and you can then use it to make sure that no one has made any illicit modifications to the computer system. In the case of a break in, you know exactly which files have been modified, added, or removed.

Changes: Updated output format for "new" file checksums to match "removed".
tags | tool, intrusion detection
systems | unix
SHA-256 | b0c09cf90404045759571a768a1f4581c0fc7db9a07bc00fef7356c799b200ec
afick-2.8-3.tgz
Posted Jul 12, 2006
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Some bug fixes and additions.
tags | tool, integrity
systems | windows, unix
SHA-256 | 24812075724e456c4d9024c9ee9dd279f4ac196626517eab95e785e3c6a40556
darc-0.3.47.tgz
Posted Apr 29, 2006
Authored by Jacob Martinson | Site icculus.org

Darc is a utility for managing large Aide installations in heterogeneous environments. It eliminates the need to maintain read-only media on every system, and provides unified reporting on filesystem changes across all machines.

tags | tool, intrusion detection
systems | unix
SHA-256 | 1166636ff0d3c032402122acc6d2c06e202789b30186e3fc3c9264e475db1ce5
darc-0.3.42.tgz
Posted Apr 25, 2006
Authored by Jacob Martinson | Site icculus.org

Darc is a utility for managing large Aide installations in heterogeneous environments. It eliminates the need to maintain read-only media on every system, and provides unified reporting on filesystem changes across all machines.

tags | tool, intrusion detection
systems | unix
SHA-256 | 953d151194679881547cd594c38de89a165b5696abb1146fc12c91c68aeba224
Secunia Security Advisory 19032
Posted Mar 4, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in RaidenHTTPD, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | b30a1798ebd5f5aeea41b10335b1e219ba621e3de7bfcf3e29a45f7d83d3d54b
AIDE 0.11
Posted Feb 26, 2006
Authored by Rami Lehti | Site aide.github.io

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

Changes: Various bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | ebc866c7d70166ac76ab0fa158e4bbf42780b4bd360e177f7a6586778b301374
RFC-NG-3.3.0.tar.gz
Posted Nov 20, 2005
Authored by Claudio Panichi | Site rfc.sourceforge.net

RFC (Remote Filesystem Checker) is a set of scripts that aims to help system administrators run a filesystem checker (like tripwire, aide, etc.) from a master-node to several slave-nodes using ssh, scp, sudo, and few other common shell commands.

Changes: Minor release with an updated AFICK and nice contributions from some RFC's users.
tags | tool, remote, shell, integrity
SHA-256 | dbabd1edfd938cd01ffaa094c7698d70d516922009dc18072bbb7990956da8d8
Ubuntu Security Notice 151-3
Posted Oct 31, 2005
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-151-3 - USN-148-1 and USN-151-1 fixed two security flaws in zlib, which could be exploited to cause Denial of Service attacks or even arbitrary code execution with malicious data streams. Since aide is statically linked against the zlib library, it is also affected by these issues.

tags | advisory, denial of service, arbitrary, code execution
systems | linux, ubuntu
advisories | CVE-2005-1849, CVE-2005-2096
SHA-256 | e648bcae15214f4071931ab9828a2a130291bfc0ecfc2a39cc9d2a7b39d43c78
integrit-3.05.tar.gz
Posted Sep 22, 2005
Site integrit.sourceforge.net

Integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. integrit's major advantages are a small memory footprint and simplicity. It works by creating a database that is a snapshot of the most essential parts of your computer system. You put the database somewhere safe, and you can then use it to make sure that no one has made any illicit modifications to the computer system. In the case of a break in, you know exactly which files have been modified, added, or removed.

Changes: Documented Chris Johns changes and updated Makefile targets for developers.
tags | tool, intrusion detection
systems | unix
SHA-256 | 12aa8e7506120af5d3dfb3a07869450f492f876d99f18d9f623d17120ac2475d
afick-2.8-2.tgz
Posted Aug 19, 2005
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Some bug fixes and tweaks.
tags | tool, integrity
systems | windows, unix
SHA-256 | c5fd7d1c40a884f0a4f1a2e5f7b261488bdf04fd487021332a89a08a08a1af19
darc-0.2.tgz
Posted Aug 14, 2005
Authored by Jacob Martinson | Site info234.com

Darc is a utility for managing large Aide installations in heterogeneous environments. It eliminates the need to maintain read-only media on every system, and provides unified reporting on filesystem changes across all machines.

tags | tool, intrusion detection
systems | unix
SHA-256 | eb449b0ff38d5b87a6801c47f4ae0eaaf3dccb61a6bc8019f89ef8624ac20581
raidenftpdTraverse.txt
Posted Jul 2, 2005
Authored by Lachlan. H

RaidenFTPD versions below 2.4.2241 allow for a directory traversal attack via urlget.

tags | exploit
SHA-256 | b157b789ba21b614aa3d84f4e229b30854ba58b5ca1aa2b90b36bcb7f08773c5
afick-2.8-1.tgz
Posted Jun 29, 2005
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Multiple bug fixes.
tags | tool, integrity
systems | windows, unix
SHA-256 | 43a586e3490623a7921efada877bfeb20f6c222b776c55bc6b57c8bc3ecf5b16
afick-2.8-0.tgz
Posted Jun 18, 2005
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Restricted permissions on database files, allows md5 and sha-1 checksums, various other fixes and additions.
tags | tool, integrity
systems | windows, unix
SHA-256 | 19cd426419baadcebc1b19df6da2121806a3290047903d2bb679ac71f549fe06
afick-2.7-1.tgz
Posted Jun 1, 2005
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Various bug fixes.
tags | tool, integrity
systems | windows, unix
SHA-256 | 9f41debb19bde9b1d1da8fc9ca42d7f82c8cb9130a83962750212f8fa789c82c
Secunia Security Advisory 15037
Posted May 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in RaidenFTPD, which can be exploited by malicious users to gain knowledge of sensitive information.

tags | advisory
SHA-256 | 6a5d3707e9ccd03fc09a797c5d98e55792b73b5547710f131f02b03dbe089e7e
raidenhttpd1132.txt
Posted Mar 1, 2005
Authored by Tan Chew Keong | Site security.org.sg

RaidenHTTPD server version 1.1.32 is susceptible to buffer overflow and CGI source disclosure vulnerabilities.

tags | advisory, overflow, cgi, vulnerability
SHA-256 | d2408ee1ff18446cf63b8d9a8520baa45564e5d5ef31391519cfc4f71f2eb461
afick-2.7-0.tgz
Posted Feb 25, 2005
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Various bug fixes and additions.
tags | tool, integrity
systems | windows, unix
SHA-256 | e3f09a9a0399e01cdefafa2890c3035f00fe36e3496a0dcdbd5c67782f10de82
RaidenHTTPD.txt
Posted Feb 6, 2005
Authored by Donato Ferrante | Site autistici.org

RaidenHTTPD version 1.1.27 is susceptible to a directory traversal flaw where any file can be extracted from the disk partition where the httpd is installed.

tags | exploit
SHA-256 | 269edca2c20fc62296721fc364efa750631965f3d26ff48a5c321679256841a2
afick-2.6-2.tgz
Posted Jan 16, 2005
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Various bug fixes.
tags | tool, integrity
systems | windows, unix
SHA-256 | 7225d43ab26cccb002706ef7a5a34608180b4034947e0e844593c860456d3b21
afick-2.6-0.tgz
Posted Dec 30, 2004
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Minor improvements.
tags | tool, integrity
systems | windows, unix
SHA-256 | 05b618247a27c7071e7d53454352fd885d4de91b85d7693c9fbf0648e34ef4d1
afick-2.5-0.tgz
Posted Nov 13, 2004
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Minor bug fixes and improvements.
tags | tool, integrity
systems | windows, unix
SHA-256 | 733ee495b9979603e102afbec061968d3ded59e088c0985156b9b853efb19951
afick-2.4-0.tgz
Posted Oct 27, 2004
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: A couple minor bug fixes and improvements.
tags | tool, integrity
systems | windows, unix
SHA-256 | 2144837c5196a9790b397cad71b7615fad76251b4cf01de33fe4de9710eac461
RFC-NG-3.2.0.tar.gz
Posted Aug 31, 2004
Authored by Claudio Panichi | Site rfc.sourceforge.net

RFC (Remote Filesystem Checker) is a set of scripts that aims to help system administrators run a filesystem checker (like tripwire, aide, etc.) from a master-node to several slave-nodes using ssh, scp, sudo, and few other common shell commands.

Changes: Minor fixes.
tags | tool, remote, shell, integrity
SHA-256 | d44a76febd0400f975eeecda7d4a61a9cdf8fa8cce822786c156192af1fe4200
Page 3 of 4
Back1234Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close